Liming Lu

Orcid: 0000-0003-3214-9945

According to our database1, Liming Lu authored at least 34 papers between 2002 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
RoboView-Bias: Benchmarking Visual Bias in Embodied Agents for Robotic Manipulation.
CoRR, September, 2025

SafeSteer: Adaptive Subspace Steering for Efficient Jailbreak Defense in Vision-Language Models.
CoRR, September, 2025

FERD: Fairness-Enhanced Data-Free Robustness Distillation.
CoRR, September, 2025

CIARD: Cyclic Iterative Adversarial Robustness Distillation.
CoRR, September, 2025

Towards a 3D Transfer-based Black-box Attack via Critical Feature Guidance.
CoRR, August, 2025

HoneyWin: High-Interaction Windows Honeypot in Enterprise Environment.
CoRR, May, 2025

Adversarial Training for Multimodal Large Language Models against Jailbreak Attacks.
CoRR, March, 2025

2024
A Novel Robotic Path Planning Method in Grid Map Context Based on D* Lite Algorithm and Deep Learning.
J. Circuits Syst. Comput., March, 2024

An Efficient and Autonomous Planning Scheme for Deploying IoT Services in Fog Computing: A Metaheuristic-Based Approach.
IEEE Trans. Comput. Soc. Syst., February, 2024

Extraction of Tobacco Planting Information Based on UAV High-Resolution Remote Sensing Images.
Remote. Sens., January, 2024

Investigating Patterns of Adversarial Techniques for Cyberattack Forensics.
Proceedings of the 23rd IEEE International Conference on Trust, 2024

Security Situation Awareness Platform.
Proceedings of the 17th International Conference on Security of Information and Networks, 2024

Simulation of Pre-Ransomware Attacks on Active Directory.
Proceedings of the 17th International Conference on Security of Information and Networks, 2024

Combating Cyberbullied Images in the Real World: A Comparative Study of CNN Architectures.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2024

UniADS: Universal Architecture-Distiller Search for Distillation Gap.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
User Experience on a Virtual Patient Chatbot for Physiotherapy Student Training.
Proceedings of the IEEE International Conference on Teaching, 2023

Remote Sensing Inversion of Tobacco SPAD Based on UAV Hyperspectral Imagery.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2023

Tobacco Information Extraction Based on UAV High Resolution Images.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2023

Implementation of a Virtual Patient Chatbot for Physiotherapy Students Training.
Proceedings of the IEEE International Conference on Industrial Engineering and Engineering Management, 2023

2022
Development of a Chatbot to Train Physiotherapy Students in Clinical Questioning and Reasoning.
Proceedings of the IEEE International Conference on Teaching, 2022

An Improved 5G NR LDPC Decoding Algorithm Based On Box-Plus Operation.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2022

2021
Incremental concept cognitive learning based on three-way partial order structure.
Knowl. Based Syst., 2021

2020
Research on Situation Creation in Curriculum Integration under Cloud Computing Environment.
Proceedings of the CIPAE 2020: 2020 International Conference on Computers, 2020

2016
Single-cell RNA-seq identifies a PD-1<sup>hi</sup> ILC progenitor and defines its development pathway.
Nat., 2016

Cyber and Physical Access Control in Legacy System Using Passwords.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016

2011
Monitoring, analyzing and characterizing lookup traffic in a large-scale DHT.
Comput. Commun., 2011

2010
Enhancing Host Security Using External Environment Sensors.
Proceedings of the Security and Privacy in Communication Networks, 2010

Study on the Online Control System to Prevent Drunk Driving Based on Photoelectric Detection Technology.
Proceedings of the Computer and Computing Technologies in Agriculture IV, 2010

A Simple Effective Scheme to Enhance the Capability of Web Servers Using P2P Networks.
Proceedings of the 39th International Conference on Parallel Processing, 2010

Website Fingerprinting and Identification Using Ordered Feature Sequences.
Proceedings of the Computer Security, 2010

2009
A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks.
Proceedings of the Scalable Information Systems, 4th International ICST Conference, 2009

2008
A general model of probabilistic packet marking for IP traceback.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2006
Effect of Malicious Synchronization.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2002
A Target Detection Method in Range-Doppler Domain from SAR Echo Data.
Proceedings of the 16th International Conference on Pattern Recognition, 2002


  Loading...